-
Generate the RSA key using p11tool2
|
›_ Console |
|
-
Verify that the keys are generated onto the HSM using following command
|
›_ Console |
|
Example:
|
›_ Console |
|
-
Generate a certificate signing request (CSR)
|
›_ Console |
|
Here SSLCert is the token label and CertKey is the key on the HSM. Provide Cryptouser PIN when prompted.
Figure 4: Certificate request output
Figure 5: Content of certificate request file
-
Create the self-signed certificate based on the generated key
|
›_ Console |
|
Here SSLCert is the token label and CertKey is the key on the HSM. Provide Cryptouser PIN when prompted.
Figure 6: Self signed certificate generation output
Figure 7: Content of self-signed certificate file
-
Create a sample text file with any content inside it
|
›_ Console |
|
Figure 8: Content of message.txt
-
Sign the message file
|
›_ Console |
|
Here SSLCert is the token label and CertKey is the key on the HSM. Provide Cryptouser PIN when prompted.
Figure 9: Content of signed message file
-
Encrypt the signed message file
|
›_ Console |
|
Figure 10: Encrypted message file content
-
Decrypt the encrypted signed message file
|
›_ Console |
|
Figure 11: Decrypt Sign message
Figure 12: Content of decrypted signed message file
Here SSLCert is the token label and CertKey is the key on the HSM. Provide Cryptouser PIN when prompted.
-
Verify the decrypted signed message file
|
›_ Console |
|
Figure 13: Output of openssl verification command
Figure 14: Output of original message content